Docker version of WiFiChallenge Lab with modifications in the challenges and improved stability. Ubuntu virtual machine with virtualized networks and clients to perform WiFi attacks on OPN, WPA2, WPA3 and Enterprise networks.
For direct access to download the VM and complete the challenges go to the CTFd web site:
The principal changes from version 1.0.5 to 2.0.3 are the following.
- Remove Nested VMs. Replaced with Docker
- Add new attacks and modify the existent to make them more real
- WPA3 bruteforce and downgrade
- MGT Multiples APs
- Real captive portal evasion (instead of just MAC filtering)
- Phishing client with fake website.
- Eliminating the WPS pin attack as it is outdated, unrealistic, and overly simplistic.
- Use Ubuntu as SO instead of Debian
- Use vagrant to create the VM to be easy to replicate
- More Virtual WiFi adapters
- More APs
- More clients
- Monitorization and detection using nzyme WIDS.
To get started with the VM, download the appropriate version for your preferred platform:
- Download a Ubuntu20.04 VM
- Execute the following code as root
cd /var/
git clone https://github.com/r4ulcl/WiFiChallengeLab-docker
bash /var/WiFiChallengeLab-docker/vagrant/install.sh
- Reboot and login with user/user
- Continue in lab.wifichallenge.com
Clone the repository and set up Docker to manage Access Points (APs), clients, and nzyme for alerts:
git clone https://github.com/r4ulcl/WiFiChallengeLab-docker
cd WiFiChallengeLab-docker
docker compose up -d --file docker-compose.yml
- A host with at least 4 CPU cores and 4 GB of RAM.
- vagrant
- VirtualBox, VMware or Hyper-V
git clone https://github.com/r4ulcl/WiFiChallengeLab-docker
cd WiFiChallengeLab-docker
cd vagrant
Edit file vagrantfile memory and CPU to your needs.
nano vagrantfile
If you want a VMWare VM:
vagrant up vmware_vm
For a VirtualBox VM:
vagrant up virtualbox_vm
And for a Hyper-v VM, in a admin console:
vagrant up hyper-v_vm --provider=hyperv
- Download a Ubuntu20.04 VM
- Execute the following code as root
cd /var/
git clone https://github.com/r4ulcl/WiFiChallengeLab-docker
bash /var/WiFiChallengeLab-docker/vagrant/install.sh
- The tools are installed and can be found in the tools folder of the root home.
- There are 7 antennas available, wlan0 to wlan6.
- Do not disturb mode can be disabled with the following command.
- Start the docker-compose.yml file and use the virtual WLAN.
- Use your own tools and configurations to attack.
- TODO
To modify the files you can download the repository and edit both APs and clients (in the VM the path is /var/WiFiChallengeLab-docker). The files are divided by APs, Clients, and Nzyme files.
To recreate the Docker files with the changes made, modify the docker-compose.yml file by commenting out the "image:" line in each Docker and uncommenting the line with "build:". Then use "docker compose build" to create a new version.
-
Raúl Sampedro (@rsrdesarrollo) - Update the Nzyme Docker configuration to support ARM architecture
-
Oscar Alfonso (OscarAkaElvis / v1s1t0r, airgeddon author) - Collaboration in testing and script improvement